Unlock instant, AI-driven research and patent intelligence for your innovation.

Tamper resistant counters

a counter and programmable memory technology, applied in the field of programmable memory cell counters, can solve the problems of destroying, destroying, and destroying targeted one-time programmable memory cells, and achieve the effect of improving security

Active Publication Date: 2022-04-19
THE BOEING CO
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a way to improve security for devices that use one-time programmable memory cells to count events. By programming the cells in a random order, the likelihood of an attacker being able to successfully reset the cells and access data associated with a previous counter value is reduced. The device also uses a secret cryptographic key to generate a second sequence of numbers, which is indicative of the number of cells in the array of cells. This further enhances the security of the device.

Problems solved by technology

However, certain physical attacks can reset or destroy targeted one-time programmable memory cells.
An attacker sometimes can, with expensive, large, sophisticated equipment reset some of the one-time programmable cells; however, the security device can detect such an external cell-reset attack if an invalid bit pattern is detected.
Because pseudorandom bits are programmed each time the event occurs to increase the counter value, an attacker will not know which bit patterns are valid.
As a result, attempts to reset some one-time programmable memory cells to replay an earlier counter value likely will result in an invalid bit pattern.
Even if an attacker is able to observe earlier counter values, the associated programmed cells are dispersed among all the cells, and resetting such patterns of cells is extremely difficult.
The secret cryptographic key 202 is unique among application-specific integrated circuits (ASICs) at a relatively high probability and therefore unpredictable.
As a result of the techniques described with respect to FIGS. 1-2, conventional attacks or techniques for resetting one-time programmable memory cells may be unsuccessful.
However, because heating a die with a focused laser will likely destroy a large number of proximate cells 106 (e.g., destroy different sections 104 at a time), the bit patterns resulting from such an attack will likely indicate an invalid counter value.
The techniques described with respect to FIG. 5 for detecting an invalid counter value reduce the likelihood that straightforward techniques for resetting one-time programmable memory cells are successful.
However, because heating a die with a focused laser will likely destroy a large number of proximate cells 106 (e.g., destroy different sections 104 at a time), the bit patterns resulting from such an attack will likely indicate an invalid counter value.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper resistant counters
  • Tamper resistant counters
  • Tamper resistant counters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016]Particular embodiments of the present disclosure are described below with reference to the drawings. In the description, common features are designated by common reference numbers throughout the drawings.

[0017]The figures and the following description illustrate specific exemplary embodiments. It will be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles described herein and are included within the scope of the claims that follow this description. Furthermore, any examples described herein are intended to aid in understanding the principles of the disclosure and are to be construed as being without limitation. As a result, this disclosure is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.

[0018]Particular implementations are described herein with reference to the drawings. In the description, common featu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of persistently storing event counts includes generating, using a secret cryptographic key, a sequence of numbers arranged in a pseudorandom order. The sequence of numbers is indicative of a sequence of addresses of cells in an array of cells. Each cell in the array of cells is programmable from an initial state to a programmed state to persistently encode data indicative of counter values associated with a particular event. The method also includes comparing addresses of cells having the programmed state with the sequence of addresses to determine whether a tampering event occurred at the array of cells. The method further includes, based on the determination, authenticating the array of cells or performing a countermeasure.

Description

FIELD OF THE DISCLOSURE[0001]The present disclosure is related to one-time programmable memory cell counters.BACKGROUND[0002]In a security device, certain events have to be counted and the counter value has to be preserved over numerous power cycles. For example, in a flight application, the number of times a flight computer is powered on is counted and the counter value is preserved over numerous cycles. Sensitive information or data can be encrypted based on the counter value and stored at a flight computer in a storage device, which may be accessible to an attacker (e.g. a disk drive). To preserve the counter value over prolonged or unanticipated power down events, the security device can implement a counter using one-time programmable memory cells, which are embedded in the security device, and thereby cannot be illicitly replaced. For example, each time the flight computer is powered on, the security device can change the state of particular one-time programmable memory cells f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F21/00H04L29/06H04L9/00G06F21/44G06F21/71H04L9/08
CPCH04L9/002G06F21/44G06F21/71H04L9/0869G06F21/79G06F21/76
Inventor HARS, LASZLO
Owner THE BOEING CO